Stephanie Balaouras

Stephanie serves Security & Risk Professionals. She leads a team of analysts who provide research and advisory services on topics like IT security frameworks; governance, risk, and compliance (GRC); identity and access management (IAM); application security; data security; and IT infrastructure security. She also provides Forrester's coverage of specific risk topics including business continuity, IT continuity/disaster recovery, and backup and recovery.

Previous Work Experience

Stephanie has more than 12 years of experience in BC/DR, backup and recovery, and information storage industries. Prior to joining the Security & Risk team, Stephanie was a principal analyst on Forrester's Infrastructure & Operations team, where she was instrumental in the development of Forrester's research and offerings in continuity, availability, and information storage and protection.

Prior to joining Forrester, Stephanie was a senior analyst with Yankee Group, where she provided insight on technology trends to key system, storage, and information protection vendors and consultative advice on strategic and tactical initiatives. Before Yankee Group, Stephanie worked at EMC, first as a technical architect and then as a senior education and productivity consultant. As a technical architect, she articulated EMC's value to partners and customers and designed solutions to meet customer and new market opportunities. As an education and productivity consultant, she managed and supported complex technical training programs for business and practice managers in EMC's Technology Solutions Group. Prior to EMC, Stephanie worked at Accenture as a consultant, focusing on the implementation of business applications (SAP, PeopleSoft) for global businesses.

Education

Stephanie holds a bachelor's degree in business administration and finance and investments from Babson College.

Stephanie Balaouras

Stephanie serves Security & Risk Professionals. She leads a team of analysts who provide research and advisory services on topics like IT security frameworks; governance, risk, and compliance (GRC); identity and access management (IAM); application security; data security; and IT infrastructure security. She also provides Forrester's coverage of specific risk topics including business continuity, IT continuity/disaster recovery, and backup and recovery.

Previous Work Experience

Stephanie has more than 12 years of experience in BC/DR, backup and recovery, and information storage industries. Prior to joining the Security & Risk team, Stephanie was a principal analyst on Forrester's Infrastructure & Operations team, where she was instrumental in the development of Forrester's research and offerings in continuity, availability, and information storage and protection.

Prior to joining Forrester, Stephanie was a senior analyst with Yankee Group, where she provided insight on technology trends to key system, storage, and information protection vendors and consultative advice on strategic and tactical initiatives. Before Yankee Group, Stephanie worked at EMC, first as a technical architect and then as a senior education and productivity consultant. As a technical architect, she articulated EMC's value to partners and customers and designed solutions to meet customer and new market opportunities. As an education and productivity consultant, she managed and supported complex technical training programs for business and practice managers in EMC's Technology Solutions Group. Prior to EMC, Stephanie worked at Accenture as a consultant, focusing on the implementation of business applications (SAP, PeopleSoft) for global businesses.

Education

Stephanie holds a bachelor's degree in business administration and finance and investments from Babson College.

CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect the brand, they help their firms drive growth and long-term success. This report — the third of three in the process competency of the cybersecurity and privacy playbook — helps CIOs at firms in the advanced phase continue to optimize their cybersecurity and privacy processes and maximize business performance.

The marketing-privacy ecosystem is about to change — again. If 2018 was the year of regulatory action, then 2019 will be the year of consumer action. This will open new opportunities for brands that choose to make privacy a competitive differentiator, and create significant business risk for those that choose to ignore it. This report lays out Forrester's five predictions for how the evolution of privacy and data ethics will impact marketers in 2019.

Climate change is one of the most important business issues of our time. Even as companies and countries around the world have committed to phasing out fossil fuels and stem global warming, the impacts of climate change are already here. In the coming years, businesses will need to adapt to a host of new physical, social, and political risks or face extinction. Many will also find ways to innovate and win market share. This report helps risk professionals navigate the evolving risks and opportunities posed by climate change.

A Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter. ZT mandates that enterprises create microperimeters of control around their sensitive data assets to gain visibility into how they use data across their ecosystem to win, serve, and retain customers. This report gives security and risk (S&R) leaders best practices and a five-step road map to realize the benefits of a Zero Trust strategy more quickly.

CIOs and technology leaders in the intermediate phase of the journey to cybersecurity and privacy maturity must ensure that security travels with the data and position data security and privacy as competitive differentiators. Firms in this phase must move to proactively protect customers from complex privacy abuses and cybercriminals. This report — the second of three in the technology competency of the cybersecurity and privacy playbook — helps CIOs meet the challenges of the intermediate phase.

Data is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. Forrester's data security and privacy playbook shows security & risk (S&R) pros how to navigate the complex market for data security and privacy solutions. It guides you through major changes to processes for data policy development, inventory, classification, and protection, and identifies the technologies and services that will help you design and implement effective data security while enforcing privacy policy. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy. We revised this edition to factor in new events and data.

A Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter. ZT mandates that enterprises create microperimeters of control around their sensitive data assets to gain visibility into how they use data across their ecosystem to win, serve, and retain customers. This report gives security and risk (S&R) leaders best practices and a five-step road map to realize the benefits of a Zero Trust strategy more quickly.

This report outlines Forrester's guidance for a business technology resiliency (BTR) business case. This is a critical step when securing funding because management is often reluctant to fund investments in BTR — including backup, high availability, and disaster recovery — because they represent cost avoidance, rather than a return on investment. But in today's age of 24x7x365 global operations and unrelenting customer demand, downtime can threaten your competitive advantage and erode market share. To help infrastructure and operations (I&O) professionals overcome dangerous and outdated thinking, this report builds the business case for BTR and outlines seven steps that I&O professionals must take to successfully secure funding for BTR initiatives.

Backup remains as problematic as ever, but there are several emerging trends in technology and functional convergence that should address some of the biggest challenges: increasing capacities, shrinking backup windows, increasing recovery point requirements, and limited budgets. This report takes a look at the trends that are changing traditional backup and that will affect purchasing decisions over the next 12 months.